SlideShare a Scribd company logo
1 of 1
Download to read offline
The First Step in Cyber Insurance: Know Your
Risk and What you’re Insuring Against.
Cyber insurance provides an opportunity to address residual risk in your information security program to offset the costs
due to a data breach of ePHI. However, individuals polices, coverage and exclusions are highly variable, so just like any
security control it's important to understand your security risk profile before an appropriate security insurance policy can
be defined. An assessment, such as a HIPAA Security Risk Analysis should be the first step in any insurance policy
strategy. Here's why:

You'll have to do one anyway. The most important factor in most enterprise cyber insurance rates is the state of your
current security controls and your revenue. So not only is a security risk analysis an essential part of any robust
information security program that you should be doing anyway, but this will be a factor in your rates and likely a
requirement before you secure a policy.

The safest approach is to avoid a breach in the first place. Most policies will require substantial out-of-pocket expenses to
be paid by the insured regardless of your coverage. No insurance can fully replace lost productivity and brand damage due
to a breach. A recent study released by Carnegie Mellon University (and others), “An Empirical Analysis of Data Breach
Litigation,”notes that “the odds of a settlement are found to be 10 times greater when the breach is caused by a cyber-
attack, relative to lost or stolen hardware, and the compromise of medical data increases the probability of settlement by
31%.” Thus, insure against theft but still spend money on locks for your doors!

Your risk profile will enable a better tailored policy. Cyber insurance policy coverage is highly variable and configurable.
Policy buyers need to be aware of what is covered and that distinct coverage, limits, and deductibles may apply for
individual risk categories. In order to ensure that a policy is tailored for your individual risk profile it's important to
understand where your risk lies. Areas that can be insured typically include regulatory fines and penalties, claims and
lawsuits and response costs such as breach notification for affected customers, credit monitoring, forensic analysis, legal
fees, and public relations outreach.

Do you really know where your risk is? A key area of risk that a security risk analysis illuminates can be the extent that
Business Associates (BA) factor into your overall risk. Our experience is that BAs often pose more risk than might be
expected in terms of the amount of ePHI that they access and/or host because their security controls are not always on par
with that of the healthcare organization that provided the data despite the Business Associate Agreement that is in place.
This is particularly relevant when the BA is a cloud provider. A security risk analysis should clarify the extent of cloud-
based and BA risk so that this critical part of the policy can be defined appropriately.

Cyber insurance can prove to be an effective tool for mitigating the fiscal impact of an ePHI data breach. With proper
policy review and selection, guided by an informed view of your risk profile, it's more likely that such a policy can achieve
your objectives and be accurately scoped.




                         WEB                               PHONE                             EMAIL

                WWW.REDSPIN.COM                        800-721-9177                  INFO@REDSPIN.COM

More Related Content

More from Redspin, Inc.

Healthcare IT Security Who's Responsible, Really?
Healthcare IT Security Who's Responsible, Really?Healthcare IT Security Who's Responsible, Really?
Healthcare IT Security Who's Responsible, Really?Redspin, Inc.
 
Healthcare IT Security - Who's responsible, really?
Healthcare IT Security - Who's responsible, really?Healthcare IT Security - Who's responsible, really?
Healthcare IT Security - Who's responsible, really?Redspin, Inc.
 
Redspin Webinar - Prepare for a HIPAA Security Risk Analysis
Redspin Webinar - Prepare for a HIPAA Security Risk AnalysisRedspin Webinar - Prepare for a HIPAA Security Risk Analysis
Redspin Webinar - Prepare for a HIPAA Security Risk AnalysisRedspin, Inc.
 
Redspin Webinar Business Associate Risk
Redspin Webinar Business Associate RiskRedspin Webinar Business Associate Risk
Redspin Webinar Business Associate RiskRedspin, Inc.
 
Redspin HIPAA Security Risk Analysis RFP Template
Redspin HIPAA Security Risk Analysis RFP TemplateRedspin HIPAA Security Risk Analysis RFP Template
Redspin HIPAA Security Risk Analysis RFP TemplateRedspin, Inc.
 
Mobile Device Security Policy
Mobile Device Security PolicyMobile Device Security Policy
Mobile Device Security PolicyRedspin, Inc.
 
Financial institution security top it security risk
Financial institution security top it security riskFinancial institution security top it security risk
Financial institution security top it security riskRedspin, Inc.
 
Managing Windows User Accounts via the Commandline
Managing Windows User Accounts via the CommandlineManaging Windows User Accounts via the Commandline
Managing Windows User Accounts via the CommandlineRedspin, Inc.
 
Redspin February 17 2011 Webinar - Meaningful Use
Redspin February 17 2011 Webinar - Meaningful UseRedspin February 17 2011 Webinar - Meaningful Use
Redspin February 17 2011 Webinar - Meaningful UseRedspin, Inc.
 
Redspin Report - Protected Health Information 2010 Breach Report
Redspin Report - Protected Health Information 2010 Breach ReportRedspin Report - Protected Health Information 2010 Breach Report
Redspin Report - Protected Health Information 2010 Breach ReportRedspin, Inc.
 
Redspin & Phyllis and Associates Webinar- HIPAA,HITECH,Meaninful Use,IT Security
Redspin & Phyllis and Associates Webinar- HIPAA,HITECH,Meaninful Use,IT SecurityRedspin & Phyllis and Associates Webinar- HIPAA,HITECH,Meaninful Use,IT Security
Redspin & Phyllis and Associates Webinar- HIPAA,HITECH,Meaninful Use,IT SecurityRedspin, Inc.
 
Email hacking husband faces felony
Email hacking husband faces felonyEmail hacking husband faces felony
Email hacking husband faces felonyRedspin, Inc.
 
Meaningful use, risk analysis and protecting electronic health information
Meaningful use, risk analysis and protecting electronic health informationMeaningful use, risk analysis and protecting electronic health information
Meaningful use, risk analysis and protecting electronic health informationRedspin, Inc.
 
Understanding the Experian independent third party assessment (EI3PA ) requir...
Understanding the Experian independent third party assessment (EI3PA ) requir...Understanding the Experian independent third party assessment (EI3PA ) requir...
Understanding the Experian independent third party assessment (EI3PA ) requir...Redspin, Inc.
 
Top 10 IT Security Issues 2011
Top 10 IT Security Issues 2011Top 10 IT Security Issues 2011
Top 10 IT Security Issues 2011Redspin, Inc.
 
Beginner's Guide to the nmap Scripting Engine - Redspin Engineer, David Shaw
Beginner's Guide to the nmap Scripting Engine - Redspin Engineer, David ShawBeginner's Guide to the nmap Scripting Engine - Redspin Engineer, David Shaw
Beginner's Guide to the nmap Scripting Engine - Redspin Engineer, David ShawRedspin, Inc.
 
Ensuring Security and Privacy in the HIE Market - Redspin Information Security
Ensuring Security and Privacy in the HIE Market - Redspin Information SecurityEnsuring Security and Privacy in the HIE Market - Redspin Information Security
Ensuring Security and Privacy in the HIE Market - Redspin Information SecurityRedspin, Inc.
 
Mapping Application Security to Business Value - Redspin Information Security
Mapping Application Security to Business Value - Redspin Information SecurityMapping Application Security to Business Value - Redspin Information Security
Mapping Application Security to Business Value - Redspin Information SecurityRedspin, Inc.
 
Step by Step Guide to Healthcare IT Security Risk Management - Redspin Infor...
Step by Step Guide to Healthcare IT Security Risk Management  - Redspin Infor...Step by Step Guide to Healthcare IT Security Risk Management  - Redspin Infor...
Step by Step Guide to Healthcare IT Security Risk Management - Redspin Infor...Redspin, Inc.
 
Ensuring Security, Privacy, and Compliance in Healthcare IT - Redspin Informa...
Ensuring Security, Privacy, and Compliance in Healthcare IT - Redspin Informa...Ensuring Security, Privacy, and Compliance in Healthcare IT - Redspin Informa...
Ensuring Security, Privacy, and Compliance in Healthcare IT - Redspin Informa...Redspin, Inc.
 

More from Redspin, Inc. (20)

Healthcare IT Security Who's Responsible, Really?
Healthcare IT Security Who's Responsible, Really?Healthcare IT Security Who's Responsible, Really?
Healthcare IT Security Who's Responsible, Really?
 
Healthcare IT Security - Who's responsible, really?
Healthcare IT Security - Who's responsible, really?Healthcare IT Security - Who's responsible, really?
Healthcare IT Security - Who's responsible, really?
 
Redspin Webinar - Prepare for a HIPAA Security Risk Analysis
Redspin Webinar - Prepare for a HIPAA Security Risk AnalysisRedspin Webinar - Prepare for a HIPAA Security Risk Analysis
Redspin Webinar - Prepare for a HIPAA Security Risk Analysis
 
Redspin Webinar Business Associate Risk
Redspin Webinar Business Associate RiskRedspin Webinar Business Associate Risk
Redspin Webinar Business Associate Risk
 
Redspin HIPAA Security Risk Analysis RFP Template
Redspin HIPAA Security Risk Analysis RFP TemplateRedspin HIPAA Security Risk Analysis RFP Template
Redspin HIPAA Security Risk Analysis RFP Template
 
Mobile Device Security Policy
Mobile Device Security PolicyMobile Device Security Policy
Mobile Device Security Policy
 
Financial institution security top it security risk
Financial institution security top it security riskFinancial institution security top it security risk
Financial institution security top it security risk
 
Managing Windows User Accounts via the Commandline
Managing Windows User Accounts via the CommandlineManaging Windows User Accounts via the Commandline
Managing Windows User Accounts via the Commandline
 
Redspin February 17 2011 Webinar - Meaningful Use
Redspin February 17 2011 Webinar - Meaningful UseRedspin February 17 2011 Webinar - Meaningful Use
Redspin February 17 2011 Webinar - Meaningful Use
 
Redspin Report - Protected Health Information 2010 Breach Report
Redspin Report - Protected Health Information 2010 Breach ReportRedspin Report - Protected Health Information 2010 Breach Report
Redspin Report - Protected Health Information 2010 Breach Report
 
Redspin & Phyllis and Associates Webinar- HIPAA,HITECH,Meaninful Use,IT Security
Redspin & Phyllis and Associates Webinar- HIPAA,HITECH,Meaninful Use,IT SecurityRedspin & Phyllis and Associates Webinar- HIPAA,HITECH,Meaninful Use,IT Security
Redspin & Phyllis and Associates Webinar- HIPAA,HITECH,Meaninful Use,IT Security
 
Email hacking husband faces felony
Email hacking husband faces felonyEmail hacking husband faces felony
Email hacking husband faces felony
 
Meaningful use, risk analysis and protecting electronic health information
Meaningful use, risk analysis and protecting electronic health informationMeaningful use, risk analysis and protecting electronic health information
Meaningful use, risk analysis and protecting electronic health information
 
Understanding the Experian independent third party assessment (EI3PA ) requir...
Understanding the Experian independent third party assessment (EI3PA ) requir...Understanding the Experian independent third party assessment (EI3PA ) requir...
Understanding the Experian independent third party assessment (EI3PA ) requir...
 
Top 10 IT Security Issues 2011
Top 10 IT Security Issues 2011Top 10 IT Security Issues 2011
Top 10 IT Security Issues 2011
 
Beginner's Guide to the nmap Scripting Engine - Redspin Engineer, David Shaw
Beginner's Guide to the nmap Scripting Engine - Redspin Engineer, David ShawBeginner's Guide to the nmap Scripting Engine - Redspin Engineer, David Shaw
Beginner's Guide to the nmap Scripting Engine - Redspin Engineer, David Shaw
 
Ensuring Security and Privacy in the HIE Market - Redspin Information Security
Ensuring Security and Privacy in the HIE Market - Redspin Information SecurityEnsuring Security and Privacy in the HIE Market - Redspin Information Security
Ensuring Security and Privacy in the HIE Market - Redspin Information Security
 
Mapping Application Security to Business Value - Redspin Information Security
Mapping Application Security to Business Value - Redspin Information SecurityMapping Application Security to Business Value - Redspin Information Security
Mapping Application Security to Business Value - Redspin Information Security
 
Step by Step Guide to Healthcare IT Security Risk Management - Redspin Infor...
Step by Step Guide to Healthcare IT Security Risk Management  - Redspin Infor...Step by Step Guide to Healthcare IT Security Risk Management  - Redspin Infor...
Step by Step Guide to Healthcare IT Security Risk Management - Redspin Infor...
 
Ensuring Security, Privacy, and Compliance in Healthcare IT - Redspin Informa...
Ensuring Security, Privacy, and Compliance in Healthcare IT - Redspin Informa...Ensuring Security, Privacy, and Compliance in Healthcare IT - Redspin Informa...
Ensuring Security, Privacy, and Compliance in Healthcare IT - Redspin Informa...
 

The First Step In Cyber Insurance: Know Your Risk And What You're Insuring Against.

  • 1. The First Step in Cyber Insurance: Know Your Risk and What you’re Insuring Against. Cyber insurance provides an opportunity to address residual risk in your information security program to offset the costs due to a data breach of ePHI. However, individuals polices, coverage and exclusions are highly variable, so just like any security control it's important to understand your security risk profile before an appropriate security insurance policy can be defined. An assessment, such as a HIPAA Security Risk Analysis should be the first step in any insurance policy strategy. Here's why: You'll have to do one anyway. The most important factor in most enterprise cyber insurance rates is the state of your current security controls and your revenue. So not only is a security risk analysis an essential part of any robust information security program that you should be doing anyway, but this will be a factor in your rates and likely a requirement before you secure a policy. The safest approach is to avoid a breach in the first place. Most policies will require substantial out-of-pocket expenses to be paid by the insured regardless of your coverage. No insurance can fully replace lost productivity and brand damage due to a breach. A recent study released by Carnegie Mellon University (and others), “An Empirical Analysis of Data Breach Litigation,”notes that “the odds of a settlement are found to be 10 times greater when the breach is caused by a cyber- attack, relative to lost or stolen hardware, and the compromise of medical data increases the probability of settlement by 31%.” Thus, insure against theft but still spend money on locks for your doors! Your risk profile will enable a better tailored policy. Cyber insurance policy coverage is highly variable and configurable. Policy buyers need to be aware of what is covered and that distinct coverage, limits, and deductibles may apply for individual risk categories. In order to ensure that a policy is tailored for your individual risk profile it's important to understand where your risk lies. Areas that can be insured typically include regulatory fines and penalties, claims and lawsuits and response costs such as breach notification for affected customers, credit monitoring, forensic analysis, legal fees, and public relations outreach. Do you really know where your risk is? A key area of risk that a security risk analysis illuminates can be the extent that Business Associates (BA) factor into your overall risk. Our experience is that BAs often pose more risk than might be expected in terms of the amount of ePHI that they access and/or host because their security controls are not always on par with that of the healthcare organization that provided the data despite the Business Associate Agreement that is in place. This is particularly relevant when the BA is a cloud provider. A security risk analysis should clarify the extent of cloud- based and BA risk so that this critical part of the policy can be defined appropriately. Cyber insurance can prove to be an effective tool for mitigating the fiscal impact of an ePHI data breach. With proper policy review and selection, guided by an informed view of your risk profile, it's more likely that such a policy can achieve your objectives and be accurately scoped. WEB PHONE EMAIL WWW.REDSPIN.COM 800-721-9177 INFO@REDSPIN.COM